Articles with "cryptographic algorithms" as a keyword



Photo from wikipedia

Security of internet of things based on cryptographic algorithms: a survey

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Networks"

DOI: 10.1007/s11276-020-02535-5

Abstract: Internet of Things (IoT) is a new concept in Information and Communications Technology and its structure is based on smart objects communications. It contributes to controlling, managing, and administrating devices through the Internet. IoT is… read more here.

Keywords: things based; cryptographic algorithms; security internet; security ... See more keywords
Photo by dawson2406 from unsplash

Continuous Diffusion Analysis

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3005504

Abstract: In this work, we propose a new technique called Continuous Diffusion Analysis (CDA) that can be used to study, design, and compare of cryptographic algorithms. CDA allows us to generalize cryptographic algorithms by transforming the… read more here.

Keywords: diffusion analysis; diffusion; cryptographic algorithms; continuous diffusion ... See more keywords
Photo by jakubzerdzicki from unsplash

Performance Evaluation of Symmetric Cryptographic Algorithms in resource constrained hardware for Wireless Sensor Networks.

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Latin America Transactions"

DOI: 10.1109/tla.2021.9477225

Abstract: Wireless sensor networks (WSN) allow to exchange information and to take immediate and remote actions in natural, industrial, military or domestic environment systems. These networks are vulnerable to cyber-attacks, hence, they are vulnerable to being… read more here.

Keywords: wireless sensor; wireless; sensor networks; cryptographic algorithms ... See more keywords